ET 115 Mid Term

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 13

1.

All of the following are domains of the CBK except:


A) Relational Database Security
B) Access Control Systems and Methodology
C) Law, Investigations, and Ethics
D) Security Management Practices.
Points Earned: 1.0/1.0
Correct Answer(s): A
2.
Layered security is also referred to as:
A) None of the above.
B) Multi-system security
C) Denial of service
D) Defense in depth
Points Earned: 1.0/1.0
Correct Answer(s): D
3.
Synonyms for confidentiality include all of the following except:
A) secrecy
B) integrity
C) discretion
D) privacy
Points Earned: 1.0/1.0
Correct Answer(s): B
4.
Intellectual property law includes all of the following categories except:
A) Trade secrets
B) Patent law
C) Copyright law
D) Probate administration
Points Earned: 1.0/1.0
Correct Answer(s): D
5.
Which of the following are topics of the Physical Security domain? Select all co
rrect answers.
A) Electrical power issues and solutions
B) Backup options and technologies.
C) Physical vulnerabilities and threats
D) Physical intrusion detection system
Points Earned: 3.0/3.0
Correct Answer(s): D, A, C
6.
The BCP describes all of the following except:
A) Personnel
B) Defined policies
C) Procedures
D) Critical processes
Points Earned: 1.0/1.0
Correct Answer(s): B
7.
The Common Body of Knowledge with ____________ domains is the framework of the i
nformation security field.
A) 15
B) 11
C) 10
D) 20
E) 16
F) 6
G) 5
Points Earned: 1.0/1.0
Correct Answer(s): C
8.
Which of the following options would not be considered in a disaster recovery pl
an or business continuity plan?
A) Service bureaus for fast response
B) Multiple centers to spread processing across sites
C) Mobile units provided by a third party
D) New business
Points Earned: 1.0/1.0
Correct Answer(s): D
9.
The factors used to determine degree of risk include:
A) None of the above.
B) Determining the consequence of loss
C) Both of the above
D) Determining the likelihood that loss will occur
Points Earned: 1.0/1.0
Correct Answer(s): C
10.
An organization's security posture is defined and documented in ____________ tha
t must exist before any computers are installed. Select all that are correct!
A) sales projections
B) None of the others are correct
C) guidelines
D) procedures
E) standards
Points Earned: 3.0/3.0
Correct Answer(s): E, C, D
11.
The model for a system security policy does NOT include:
A) Policy implementation
B) Operational security
C) Management structure
D) Security objectives
Points Earned: 1.0/1.0
Correct Answer(s): C
12.
The Application Development Security domain includes all of the following topics
except:
A) ActiveX and Java.
B) Database security
C) Types of malware
D) Domain name service
Points Earned: 1.0/1.0
Correct Answer(s): D
13.
Which major category of computer crimes involves criminals and intelligence agen
ts illegally obtaining classified information?
A) Joy ridders
B) Financial attacks
C) Business attacks
D) Military and intelligence attacks
Points Earned: 1.0/1.0
Correct Answer(s): D
14.
The criteria used to rate the effectiveness of trusted systems is set forth in:
A) None of the others
B) TCSEC
C) CTCPEC
D) ITSEC
Points Earned: 1.0/1.0
Correct Answer(s): B
15.
Which of the following statements about Principle 4 is false?
A) In exchange for worthless goods, people tend to give up credentials.
B) It is easy to fool people into spreading viruses.
C) Today's virus writers are not very sophisticated.
D) The organizers of Infosecurity Europe 2003 found that 75% of survey responden
ts revealed information immediately.
Points Earned: 1.0/1.0
Correct Answer(s): C
16.
The BIA prioritizes systems for recovery and ____________ are at the top of the
list.
A) Mission-required systems
B) Less critical systems
C) Nice to have systems
D) Mission-critical systems
Points Earned: 1.0/1.0
Correct Answer(s): D
17.
IS principle 5 states that security depends on these requirements:
A) Availability and integrity
B) Functional and assurance
C) Usability and interface.
D) Verification and validation
Points Earned: 1.0/1.0
Correct Answer(s): B
18.
Step-by-step directions to execute a specific security activity is referred to a
s a:
A) Procedure
B) Guideline
C) Standard
D) Regulation
Points Earned: 1.0/1.0
Correct Answer(s): A
19.
When defining the trusted computing base, a reference monitor should be all of t
he following except:
A) Verifiable and cannot be circumvented
B) Complete in that it mediates all access
C) Isolated from modification
D) Changeable by other system entities
Points Earned: 1.0/1.0
Correct Answer(s): D
20.
Which design objective prevents data leakage and modification of the data while
it is in memory?
A) Data hiding
B) Abstraction
C) Layering
D) Process isolation
Points Earned: 1.0/1.0
Correct Answer(s): D
21.
A(n) ____________ policy focuses on policy issues that management decided for a
specific system.
A) Programme-framework
B) Issue-specific
C) System-specific
D) Programme-level
Points Earned: 0.0/1.0
Correct Answer(s): C
22.
The type of computer crime where radio frequency signals from wireless computers
are intercepted is:
A) Spoofing IP addresses
B) Dumpster diving
C) Emanation eavesdropping
D) Social engineering B.
Points Earned: 1.0/1.0
Correct Answer(s): C
23.
The Cryptography domain includes all of the following topics except:
A) Block and stream ciphers
B) IPSec, SSL, and PGP
C) Public key infrastructure components.
D) TCI/IP suite
Points Earned: 1.0/1.0
Correct Answer(s): D
24.
Electronic crime includes identity theft, forgery, and pirated bank accounts.
A) True
B) False
Points Earned: 1.0/1.0
Correct Answer(s): A
25.
Avoid phishing, ID theft, and monetary loss by taking all of the following steps
except:
A) Recognize the signs of fraud
B) Follow advice of financial services provider
C) Not Keeping virus software current.
D) Ignore links embedded in e-mail messages
Points Earned: 1.0/1.0
Correct Answer(s): C
26.
Which of the following uses a specific OS and lacks a standard interface to conn
ect to other systems?
A) Open system
B) Closed system
C) Finite-state machine
D) None of the above
Points Earned: 1.0/1.0
Correct Answer(s): B
27.
Operational procedures and tools familiar to IT specialists are covered in the M
aster Security domain.
A) True
B) False
Points Earned: 1.0/1.0
Correct Answer(s): B
28.
Security professionals activities include all of the following except:
A) Eradicating the problem
B) Naming the virus
C) Repairing the damage
D) Finding the source of the problem
Points Earned: 1.0/1.0
Correct Answer(s): B
29.
Which of the following is used to extract identifying information from a nave or
gullible user?
A) Phishing
B) None of the above
C) Cyberstalking
D) Both of the above
Points Earned: 1.0/1.0
Correct Answer(s): A
30.
Which of the following is NOT considered a common position or career opportunity
in information security?
A) Security consultant
B) Governance manager
C) nformation librarian
D) Compliance officers
Points Earned: 1.0/1.0
Correct Answer(s): C
31.
Functional requirements and assurance requirements answer which of the following
questions?
A) Does the system do the right things?
B) Does the system do the right things in the right way?
C) Both of the above
D) None of the above
Points Earned: 1.0/1.0
Correct Answer(s): C
32.
____________ is needed by businesses and agencies to determine how much security
is needed for appropriate protection.
A) Risk analysis and management
B) Education, awareness, and training
C) Separation of duties
D) Asset and data classification
Points Earned: 0.0/1.0
Correct Answer(s): D
33.
____________ assure that outsourced functions are operating within security poli
cies and standards.
A) Access coordinators
B) Vendor managers
C) Security testers
D) Security administrator
Points Earned: 1.0/1.0
Correct Answer(s): B
34.
Given enough time, tools, inclination, and ____________, a hacker can break thro
ugh any security measure.
A) skills
B) talent
C) intelligence
D) assets
Points Earned: 1.0/1.0
Correct Answer(s): A
35.
Which ITSEC assurance class includes a formal specification of security enforcin
g functions and architectural design?
A) E6
B) E3
C) E5
D) E4
Points Earned: 1.0/1.0
Correct Answer(s): A
36.
Which of the following is NOT a calculation used for quantitative risk analysis?
A) Standard deviation
B) Vulnerability
C) ALE
D) Probability
Points Earned: 1.0/1.0
Correct Answer(s): A
37.
Which of the following questions is NOT used to determine the hierarchy of the r
ings of trust?
A) Is the host in a physically secured room?
B) Does the host use software with data from the Internet?
C) Does the host have normal user accounts?
D) Will users rely on flash drives?
Points Earned: 1.0/1.0
Correct Answer(s): D
38.
Thou shalt not use a computer to bear false witness is an ethics statement inclu
ded in whose standard?
A) Internet Activities Board's Ethics and the Internet
B) Code of Fair Information Practices
C) ISC2 Code of Ethics
D) Computer Ethics Institute
Points Earned: 1.0/1.0
Correct Answer(s): D
39.
Networking professionals who create a plan to protect a computer system consider
all of the following in the planning process except:
A) Defining the structural composition of data
B) Protecting the confidentiality of data
C) Preserving the integrity of data
D) Promoting the availability of data for authorized use
Points Earned: 1.0/1.0
Correct Answer(s): A
40.
A(n) ____________ policy might prescribe the need for information security and m
ay delegate the creation and management of the program.
A) System-specific
B) Programme-level
C) Programme-framework
D) Issue-specific
Points Earned: 0.0/1.0
Correct Answer(s): B
41.
Under the Trusted Computer Security Evaluation Criteria, what classification is
reserved for protecting objects form unauthorized subjects through the assignmen
t of privilege?
A) Division B
B) Division A
C) Division D
D) Division C
Points Earned: 1.0/1.0
Correct Answer(s): D
42.
The Security Management Practices domain highlights the importance of a comprehe
nsive security plan.
A) False
B) True
Points Earned: 1.0/1.0
Correct Answer(s): B
43.
Information security is primarily a discipline to manage the behavior of:
A) Buildings and Grounds
B) Processes and Procedures
C) Organizations and People
D) Technology and Equipment
Points Earned: 1.0/1.0
Correct Answer(s): C
44.
Topics within the umbrella of information security include all of the following
except:
A) Security testing
B) Key management
C) Electronic forensics
D) Incident response
Points Earned: 1.0/1.0
Correct Answer(s): C
45.
In disaster recovery planning, a(n) ____________site provides power, air conditi
oning, heat, as well as other environmental systems but does not provide hardwar
e or software.
A) Shared
B) Warm
C) Cold
D) Hot
Points Earned: 1.0/1.0
Correct Answer(s): C
46.
The type of computer crime where attacks are made on a country's computer networ
k for economic or military gain is:
A) Rogue code
B) Emanation eavesdropping
C) Embezzlement
D) Information warfare
Points Earned: 1.0/1.0
Correct Answer(s): D
47.
The supporting documents derived from policy statements include which of the fol
lowing? Select all correct answers.
A) Guidelines
B) Regulations
C) Procedural maps
D) Standards and baselines
Points Earned: 3.0/3.0
Correct Answer(s): B, D, A
48.
The growing demand for InfoSec specialists is occurring predominantly in what ty
pes of organizations? Select all correct answers.
A) Government
B) Corporations
C) Not-for-profit foundations
Points Earned: 3.0/3.0
Correct Answer(s): A, B, C
49.
Automated methods of enforcing or supporting security policy would NOT include:
A) Prevent booting from a floppy disk
B) Intrusion detection software
C) Block file save to all but hard disk
D) Blocking telephone systems users from calling some numbers
Points Earned: 1.0/1.0
Correct Answer(s): C
50.
All of the following are used to ensure a high standard of security except:
A) Industry standards
B) Certificates
C) Ethics
D) College degrees
Points Earned: 1.0/1.0
Correct Answer(s): D
51.
More dangerous than not addressing security is obscuring security because it lea
ds to a:
A) Reduced level of security
B) Complete breakdown of security.
C) Higher level of security
D) False sense of security
Points Earned: 1.0/1.0
Correct Answer(s): D
52.
Which of the following is NOT typically a goal of the disaster recovery plan?
A) Keeping computers running
B) Meeting service-level agreements with customers.
C) Leasing new computers
D) Being proactive
Points Earned: 1.0/1.0
Correct Answer(s): C
53.
The three objectives of Network Security are:
A) Safety, access control, and secrecy
B) Confidentiality, integrity, and availability
C) Resilience, privacy, and safety
D) Confidentiality, secrecy, and privacy
E) Safety, access control, and privacy
F) Resilience, privacy, and availability
Points Earned: 1.0/1.0
Correct Answer(s): B
54.
Which of the following computer incidents/crimes/attacks resulted in the largest
dollar loss according to the 2004 Computer Crime and Security Survey?
A) Sabotage
B) Telecom fraud
C) Insider net abuse
D) Virus
Points Earned: 1.0/1.0
Correct Answer(s): D
55.
After undergoing formal testing and validation a trusted system can meet user's
requirements for all of the following except:
A) Security
B) Speed
C) Reliability
D) Effectiveness
Points Earned: 1.0/1.0
Correct Answer(s): B
56.
____________ policy speaks to specific issues of concern to the organization.
A) Programme-level
B) System-specific
C) Programme-framework
D) Issue-specific
Points Earned: 1.0/1.0
Correct Answer(s): D
57.
____________ percent of businesses that did not have a recovery plan went bankru
pt within one year of a major data loss.
A) 70
B) 30
C) 60
D) 20
E) 35
F) 40
G) 80
Points Earned: 1.0/1.0
Correct Answer(s): G
58.
Which of the following actions may be required after a high risk rating is deter
mined?
A) Management responsibility must be specified
B) Manage by routine procedures
C) Immediate action required
D) Senior management attention needed
Points Earned: 1.0/1.0
Correct Answer(s): D
59.
Which major category of computer crime usually involves illegal access of propri
etary information?
A) Business attacks
B) Military and intelligence attacks
C) Financial attacks
D) Terrorist attacks
Points Earned: 1.0/1.0
Correct Answer(s): A
60.
Which of the following statements about operational security documentation are t
rue? Select all correct answers.
A) Less formal policy may be written in memos
B) Formal policy is published as a distinct policy document
C) Informal policy may not be written at all
D) Uncommon policies are included in informal policy
Points Earned: 2.0/3.0
Correct Answer(s): B, A, C
61.
A compilation of all security information collected internationally and relevant
to information security professionals is the Orange Book.
A) False
B) True
Points Earned: 1.0/1.0
Correct Answer(s): A
62.
Which of the following statements about the CC is NOT true?
A) CC provides a common language for security requirements
B) Users and developers of IT security products create protection profiles
C) Users and developers defining security requirements ignore environmental thre
ats
D) CC breaks functional and assurance requirements into distinct elements
Points Earned: 1.0/1.0
Correct Answer(s): C
63.
Which of the following are reasons to plan for emergencies? Select all correct a
nswers.
A) Save time and money
B) Protect lives
C) maximize disruptions
D) Reduce stress
Points Earned: 3.0/3.0
Correct Answer(s): A, D, B
64.
Disaster recovery planning includes all of the following except:
A) Data entry users
B) IT systems and applications
C) Networks supporting the IT infrastructure
D) Application data
Points Earned: 1.0/1.0
Correct Answer(s): A
65.
Which of the following is NOT a step in the creation of a BCP?
A) Identify the scope
B) Create the BIA
C) Implement the plan
D) Purchase the resources
Points Earned: 1.0/1.0
Correct Answer(s): D
66.
Virus outbreaks and long passwords prevent users from accessing the systems they
need in order to perform their jobs
A) True
B) False
Points Earned: 1.0/1.0
Correct Answer(s): B
67.
An effective security policy contains which of the following information? Select
all correct answers.
A) Reference to other policies
B) Measurement expectations
C) Compliance management and measurements description
D) Smart Card Requirements
Points Earned: 3.0/3.0
Correct Answer(s): A, B, C
68.
Which of the following is NOT one of the International Safe Harbor Principles?
A) Access in order to correct, modify, or delete information
B) Security to prevent data loss, misuse, disclosure, or alteration
C) Consent over what information may be collected
D) Enforcement of privacy
Points Earned: 1.0/1.0
Correct Answer(s): C
69.
In the standards taxonomy _____________ suggests that no single person is respon
sible for approving his own work.
A) Education, awareness, and training
B) Separation of duties
C) Risk analysis and management
D) Asset and data classification
Points Earned: 1.0/1.0
Correct Answer(s): B
70.
All of the following are natural events capable of disrupting a business except:
A) Floods
B) Mudslides
C) Work stoppages
D) Hurricanes
Points Earned: 1.0/1.0
Correct Answer(s): C

You might also like